We draw up a list of requirements in the event of possible deficits in the protection, security, risk management and classification of data.
- as-is analysis of evidence for compliance requirements
- verification of the traceability of user and system activities
- impact assessment of the risks of sensitive data, e.g., in the supply chain
- evaluation emergency plan: Procedure in case of detection of e.g., data leakage
- awareness programme and employee sensibilization